GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

05/31/2021
by   Jacob Brown, et al.
0

Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of devices connected in a complex network topology. The diversity and complexity of these components present an enormous attack surface, allowing an adversary to exploit security vulnerabilities of different devices to execute a potent attack. Though significant efforts have been made to improve the security of individual devices in these systems, little attention has been paid to security at the aggregate level. In this article, we describe a comprehensive risk management system, called GRAVITAS, for IoT/CPS that can identify undiscovered attack vectors and optimize the placement of defenses within the system for optimal performance and cost. While existing risk management systems consider only known attacks, our model employs a machine learning approach to extrapolate undiscovered exploits, enabling us to identify attacks overlooked by manual penetration testing (pen-testing). The model is flexible enough to analyze practically any IoT/CPS and provide the system administrator with a concrete list of suggested defenses that can reduce system vulnerability at optimal cost. GRAVITAS can be employed by governments, companies, and system administrators to design secure IoT/CPS at scale, providing a quantitative measure of security and efficiency in a world where IoT/CPS devices will soon be ubiquitous.

READ FULL TEXT
research
01/07/2021

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are in...
research
09/30/2021

RFID Exploitation and Countermeasures

Radio Frequency Identification (RFID) systems are among the most widespr...
research
11/20/2021

You Overtrust Your Printer

Printers are common devices whose networked use is vastly unsecured, per...
research
06/14/2022

Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first

Today, large amounts of data are being continuously produced, collected,...
research
05/22/2019

Interdependent Strategic Security Risk Management with Bounded Rationality in the Internet of Things

With the increasing connectivity enabled by the Internet of Things (IoT)...
research
06/29/2020

Evaluation of Attack Vectors and Risks in Automobiles and Road Infrastructure

The evolution of smart automobiles and vehicles within the Internet of T...
research
05/18/2021

Model-based Cybersecurity Analysis: Past Work and Future Directions

Model-based evaluation in cybersecurity has a long history. Attack Graph...

Please sign up or login with your details

Forgot password? Click here to reset